Gasyori100knockimage processing codes to understand algorithm
Stars: ✭ 1,988 (+1016.85%)
Gitlab rceRCE for old gitlab version <= 11.4.7 & 12.4.0-12.8.1 and LFI for old gitlab versions 10.4 - 12.8.1
Stars: ✭ 104 (-41.57%)
Jarvis"Just Another ReVersIng Suite" or whatever other bullshit you can think of
Stars: ✭ 137 (-23.03%)
McsemaFramework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode
Stars: ✭ 2,198 (+1134.83%)
AmieA Minimalist Instruction Extender for the ARM architecture and IDA Pro
Stars: ✭ 136 (-23.6%)
Cve 2020 0688 expCVE-2020-0688_EXP Auto trigger payload & encrypt method
Stars: ✭ 134 (-24.72%)
Cve 2019 1458CVE-2019-1458 Windows LPE Exploit
Stars: ✭ 101 (-43.26%)
HackvaultA container repository for my public web hacks!
Stars: ✭ 1,364 (+666.29%)
Awesome CsirtAwesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Stars: ✭ 132 (-25.84%)
ToolsSecurity and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+654.49%)
Uac exploitEscalate as Administrator bypassing the UAC affecting administrator accounts only.
Stars: ✭ 165 (-7.3%)
ExploitsExploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (-13.48%)
Webrtc LeakCheck if your VPN leaks your IP address via the WebRTC technology
Stars: ✭ 133 (-25.28%)
Ssl CheckerPython script that collects SSL/TLS information from hosts
Stars: ✭ 94 (-47.19%)
Ida For DelphiIDA Python Script to Get All function names from Event Constructor (VCL)
Stars: ✭ 92 (-48.31%)
Cve 2020 1206 PocCVE-2020-1206 Uninitialized Kernel Memory Read POC
Stars: ✭ 133 (-25.28%)
One gadgetThe best tool for finding one gadget RCE in libc.so.6
Stars: ✭ 1,306 (+633.71%)
Crlf Injection ScannerCommand line tool for testing CRLF injection on a list of domains.
Stars: ✭ 91 (-48.88%)
Exploit Patterngenerate and search pattern string for exploit development
Stars: ✭ 153 (-14.04%)
H4ckerThis repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+5771.35%)
Cve 2019 0604cve-2019-0604 SharePoint RCE exploit
Stars: ✭ 91 (-48.88%)
IsoallocA general purpose memory allocator that implements an isolation security strategy to mitigate memory safety issues while maintaining good performance
Stars: ✭ 130 (-26.97%)
JscpwnPoC exploit for CVE-2016-4622
Stars: ✭ 89 (-50%)
Ctfsome experience in CTFs
Stars: ✭ 165 (-7.3%)
AdbsploitA python based tool for exploiting and managing Android devices via ADB
Stars: ✭ 147 (-17.42%)
Ida nightfallA dark color theme for IDA Pro
Stars: ✭ 129 (-27.53%)
Reverse ShellReverse Shell as a Service
Stars: ✭ 1,281 (+619.66%)
Btle SnifferPassively scan for Bluetooth Low Energy devices and attempt to fingerprint them
Stars: ✭ 87 (-51.12%)
Pwninitpwninit - automate starting binary exploit challenges
Stars: ✭ 127 (-28.65%)
AndroidattacherIDA debugging plugin for android armv7 so
Stars: ✭ 87 (-51.12%)
Swissarmyknifex64dbg utility for linker map files, diff files, PEiD/IDA signatures, and code signature generation
Stars: ✭ 147 (-17.42%)
Spectre Meltdown PocA semi-demi-working proof of concept for a mix of spectre and meltdown vulnerabilities
Stars: ✭ 127 (-28.65%)
ThoronThoron Framework is a Linux post-exploitation framework that exploits Linux TCP vulnerability to provide a shell-like connection. Thoron Framework has the ability to create simple payloads to provide Linux TCP attack.
Stars: ✭ 87 (-51.12%)
Pocsuite poc collectcollection poc use pocsuite framework 收集一些 poc with pocsuite框架
Stars: ✭ 127 (-28.65%)
ImgbackdoorHide your payload into .jpg file
Stars: ✭ 87 (-51.12%)
Securityadvisories🔐 Security advisories as a simple composer exclusion list, updated daily
Stars: ✭ 2,279 (+1180.34%)
JsshellJSshell - JavaScript reverse/remote shell
Stars: ✭ 167 (-6.18%)
DwarfexportExport dwarf debug information from IDA Pro
Stars: ✭ 164 (-7.87%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (-16.85%)
PhonesploitA tool for remote ADB exploitation in Python3 for all Machines.
Stars: ✭ 122 (-31.46%)
WindowsexploitsWindows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.
Stars: ✭ 1,243 (+598.31%)
EntropyEntropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-29.21%)
Kunpengkunpeng是一个Golang编写的开源POC框架/库,以动态链接库的形式提供各种语言调用,通过此项目可快速开发漏洞检测类的系统。
Stars: ✭ 1,242 (+597.75%)
Beef Over WanBrowser Exploitation Framework is a Open-source penetration testing tool that focuses on browser-based vulnerabilities .This Python Script does the changes Required to make hooked Linked Accessible Over WAN .So anyone can use this framework and Attack Over WAN without Port Forwarding [NGROK or any Localhost to Webhost Service Required ]
Stars: ✭ 82 (-53.93%)
StuffUnsorted, raw, ugly & probably poorly usable tools for reversing, exploit and pentest
Stars: ✭ 146 (-17.98%)
Awesome Hacking ResourcesA collection of hacking / penetration testing resources to make you better!
Stars: ✭ 11,466 (+6341.57%)
AngelswordPython3编写的CMS漏洞检测框架
Stars: ✭ 1,223 (+587.08%)
Blueborne ScannerBluetooth scanner for local devices that may be vulnerable to Blueborne exploit
Stars: ✭ 125 (-29.78%)
Network Threats TaxonomyMachine Learning based Intrusion Detection Systems are difficult to evaluate due to a shortage of datasets representing accurately network traffic and their associated threats. In this project we attempt at solving this problem by presenting two taxonomies
Stars: ✭ 79 (-55.62%)